Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
144s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 12:50
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
36bcd0bf1863c84be2cdb2398d205887.exe
Resource
win7-20231129-en
8 signatures
150 seconds
General
-
Target
36bcd0bf1863c84be2cdb2398d205887.exe
-
Size
396KB
-
MD5
36bcd0bf1863c84be2cdb2398d205887
-
SHA1
d8165079d9616a3502a4393e27495644196461f0
-
SHA256
ecfe749ca04339d05d3356c3be6bd1302aec7774422a905ca5312bebf6df7000
-
SHA512
2fcf561add267895798a08fbc56fa53fd0e34407792f983d1df39448d309296cf75e877f6ffaf316105d883c55eb7015cb4b0c080bc1f288a9cabd17bbf8252e
-
SSDEEP
6144:n8WER+4xoaTZAvPT+Rd7bFso13zW4yhUp7v0G9BxQZNONJi3Ymz1g:n8Wwr/T2PT+RFqo1jW4csv0wOng
Malware Config
Extracted
Family
asyncrat
Version
0.5.7B
Botnet
Default
C2
127.0.0.1:6606
127.0.0.1:7707
127.0.0.1:8808
Mutex
AsyncMutex_6SI8OkPnk
Attributes
-
delay
3
-
install
false
-
install_folder
%AppData%
aes.plain
Signatures
-
Async RAT payload 11 IoCs
resource yara_rule behavioral1/memory/2188-49-0x00000000005C0000-0x00000000006C0000-memory.dmp asyncrat behavioral1/memory/2188-60-0x00000000005C0000-0x00000000006C0000-memory.dmp asyncrat behavioral1/memory/2592-74-0x0000000000400000-0x0000000000417000-memory.dmp asyncrat behavioral1/memory/2592-76-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2592-70-0x0000000000400000-0x0000000000417000-memory.dmp asyncrat behavioral1/memory/2592-68-0x0000000000400000-0x0000000000417000-memory.dmp asyncrat behavioral1/memory/2188-66-0x00000000005C0000-0x00000000006C0000-memory.dmp asyncrat behavioral1/memory/2188-65-0x00000000005C0000-0x00000000006C0000-memory.dmp asyncrat behavioral1/memory/2188-64-0x00000000005C0000-0x00000000006C0000-memory.dmp asyncrat behavioral1/memory/2188-62-0x00000000005C0000-0x00000000006C0000-memory.dmp asyncrat behavioral1/memory/2188-61-0x00000000005C0000-0x00000000006C0000-memory.dmp asyncrat -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2592 regasm.exe 2592 regasm.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2188 set thread context of 2592 2188 36bcd0bf1863c84be2cdb2398d205887.exe 28 -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe 2592 regasm.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 2188 36bcd0bf1863c84be2cdb2398d205887.exe 2188 36bcd0bf1863c84be2cdb2398d205887.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2188 36bcd0bf1863c84be2cdb2398d205887.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2640 2188 36bcd0bf1863c84be2cdb2398d205887.exe 29 PID 2188 wrote to memory of 2640 2188 36bcd0bf1863c84be2cdb2398d205887.exe 29 PID 2188 wrote to memory of 2640 2188 36bcd0bf1863c84be2cdb2398d205887.exe 29 PID 2188 wrote to memory of 2640 2188 36bcd0bf1863c84be2cdb2398d205887.exe 29 PID 2188 wrote to memory of 2640 2188 36bcd0bf1863c84be2cdb2398d205887.exe 29 PID 2188 wrote to memory of 2640 2188 36bcd0bf1863c84be2cdb2398d205887.exe 29 PID 2188 wrote to memory of 2640 2188 36bcd0bf1863c84be2cdb2398d205887.exe 29 PID 2188 wrote to memory of 2640 2188 36bcd0bf1863c84be2cdb2398d205887.exe 29 PID 2188 wrote to memory of 2592 2188 36bcd0bf1863c84be2cdb2398d205887.exe 28 PID 2188 wrote to memory of 2592 2188 36bcd0bf1863c84be2cdb2398d205887.exe 28 PID 2188 wrote to memory of 2592 2188 36bcd0bf1863c84be2cdb2398d205887.exe 28 PID 2188 wrote to memory of 2592 2188 36bcd0bf1863c84be2cdb2398d205887.exe 28 PID 2188 wrote to memory of 2592 2188 36bcd0bf1863c84be2cdb2398d205887.exe 28 PID 2188 wrote to memory of 2592 2188 36bcd0bf1863c84be2cdb2398d205887.exe 28 PID 2188 wrote to memory of 2592 2188 36bcd0bf1863c84be2cdb2398d205887.exe 28 PID 2188 wrote to memory of 2592 2188 36bcd0bf1863c84be2cdb2398d205887.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\36bcd0bf1863c84be2cdb2398d205887.exe"C:\Users\Admin\AppData\Local\Temp\36bcd0bf1863c84be2cdb2398d205887.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:2592
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"2⤵PID:2640
-